Codacy

Codacy

dependency vulnerability scanning for java
Codacy Dependency Vulnerability Scanning Now Supports Java
Late last year, we added insecure dependencies detection to Codacy, enabling our users to identify insecure open-source components used within their...
code covage vs test coverage
Code Coverage vs. Test Coverage: What’s the Difference? 
A software development team that takes code quality seriously prioritizes metrics like “code coverage" and "test coverage" when evaluating its work....
CRA and open source
How Will the Cyber Resilience Act (CRA) Impact the Open-Source Community?
The European Union Cyber Resilience Act (CRA), expected to take effect in 2024, aims to establish strict cybersecurity requirements for software and...
cloud security posture management guide
Cloud Security Posture Management (CSPM): A Complete Guide
According to recent research by Flextera, companies are turning to the cloud to run their workloads at an accelerated pace. Their2024 State of the...
how to write clean code
How To Write Clean Code
When you write code, you shouldn't just focus on making it work. You should also aim to make it readable, understandable, and maintainable for future...
sast tools
A Comprehensive Guide to Implementing SAST Tools
In 2023, the number of data breaches hit a record high of 3,205 incidents — a shocking 78% increase compared to the previous year. As data attacks...

Subscribe
to our blog

Stay updated with our monthly newsletter.